Electronic Security System for Agricultural Field
Agricultural field security is critical today. Threats to agricultural fields can come from a variety of sources. Producers must be mindful of the danger of...
Threats and Protection on E-sim: A Prospective Study
Threats encompass a wide range of dangers, and some of these concerns are related with integrated SIM technology, such as Internet of things (IoT) identification....
Usability Analysis of Biometric Authentication Scheme for Smart Mobile Devices | Chapter 12 | Innovations in Science and Technology Vol. 6
The use of mobile devices to access data has increased in recent years, as has the use of mobile devices in applications such as web...
Theory of Securitization to Counter Ebola Virus: The Nigerian Approach
The Ebola Virus Disease (EVD) epidemic in 2014 was one of the zoonotic diseases[1] that posed a health security danger to the international community. Guinea,...
Enabling a Physical Model on Electronic Charge Compensation Device –ECCD- as a Quantum Dissipative System
An ECCD is a passive device that sends electrical currents to the electrical Earth on a regular basis. It protects the protected region from lightning...
Significant Study of Data Encryption and Steganography
The usage of the internet is increasing over the world these days, making security a big worry for consumers. Any information that is saved on...
SVD based Audio Watermarking Algorithm Using Dual Watermark for Copyright Protection
Because of the flexibility of Internet technology, concerns regarding the security of digital data have arisen. The art of masking crucial data in digital audio...
Determination of Efficient and Secured Healthcare Monitoring Based on IoT Along with Machine Learning
A Health Monitoring System (HMS) is a cutting-edge technology that provides an alternative to standard patient and health management methods. The Internet of Things (IoT)...
A Survey on MAC Layer Security Challenges in WMNs
For its self-organizing, self-configuring, and self-healing capabilities, as well as their low cost and ease of maintenance, Wireless Mesh Networks (WMNs) have emerged as a...
Advances in the Security Features of SATA Solid State Drives
The advanced tests and advancements in the security characteristics of SATA solid-state discs are the subject of this chapter. The amount of data in current...